Tuesday , January 28 2025

infosecbulletin

Microsoft Outlook Flaw Exploited by APT28 to compromise Czech, German Entities

Czechia

Friday (03.05.2024) the ministry of foreign affairs of the Czech republic issued a press release highlighting the cyberattack carried by Russian actor apt28 on Czechia. The press release reads, “Czechia jointly with Germany, the European Union, NATO and international partners strongly condemns activities of the Russian state-controlled actor APT28, who …

Read More »

“Bangladesh cyber security intelligence” (BCSI), As far as known!

"Bangladesh cyber security intelligence"

While surfing the internet for the regular activities, suddenly found a domain named (bcsi.gov.bd), “Bangladesh cyber security intelligence” (BCSI) in elaborating form. Curious mind wants to know the fact, so deep dive the domain and found a Facebook page also. According to the website, “Bangladesh cyber security intelligence” (BCSI) to …

Read More »

Addressing the Critical Cybersecurity Landscape of 2024

Enamul haque

The rapid pace of technological transformation presents both extraordinary opportunities and significant risks. Gartner’s authoritative insights into the cybersecurity trends of 2024 underscore the need for organizations to evolve their defensive strategies alongside their digital ambitions. Yesterday, viruses delivered via floppy disks were our primary concern; today, the attack surface …

Read More »

CISA Releases Three Industrial Control Systems Advisories

cisa

CISA released three advisories about Industrial Control Systems (ICS) on April 30, 2024. These advisories give current security information, vulnerabilities, and exploits related to ICS. ICSA-24-121-01 Delta Electronics CNCSoft-G2 DOPSoft:  Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. ICSA-24-016-01 SEW-EURODRIVE MOVITOOLS MotionStudio (Update A): Successful …

Read More »

CISA
GitLab account takeover bug is actively exploited in attacks

Gitlab

The U.S. federal agency CISA has included CVE-2023-7028 in its Known Exploited Vulnerabilities Catalog. This means that the vulnerability is currently being targeted by attackers. CISA has instructed federal agencies to protect their systems by May 22, giving them a deadline of three weeks. The U.S. cybersecurity agency hasn’t shared …

Read More »

Azure Logs utilizing to identify threats: Insights From Microsoft

Azure

Microsoft security experts recently conducted an exploration on how to effectively use Azure Logs to identify and counteract threat actions. Azure’s defense mechanism relies on effectively understanding and using logs to hunt for threats. Microsoft focuses on integrating best practices for log management, analysis, and incident response to stay proactive …

Read More »

U.S. Releases New AI Security Guidelines for Critical Infrastructure

Robot

DHS with Cybersecurity and Infrastructure Security Agency (CISA) have released safety and security guidelines to address AI risks that affect the safety and security of critical infrastructure systems in the US. The guidelines analyze system-level risks in three main categories. Attacks Using AI: The use of AI to enhance, plan, …

Read More »

Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

hacker

Earlier this week, EPCYBER has identified a large scale network of Chinese botnet as-a-service which consists of various domains, over 20 active telegram groups and other domestic communication channels using Chinese infrastructure. It is evident that the methods and botnet developed and used by the group, successfully bypasses latest DDoS …

Read More »